Criminology Project Topics

An Examination of the Prevalence of Cyber Crime and Its Influence on Polytechnic Students in Nigeria

An Examination of the Prevalence of Cyber Crime and Its Influence on Polytechnic Students in Nigeria

An Examination of the Prevalence of Cyber Crime and Its Influence on Polytechnic Students in Nigeria

Chapter One

 Objective Of The Study

The general aim of this study is to examine the prevalence of cyber crime and its influence on polytechnic students in Nigeria. To achieve this, the study will specifically:

  1. Examine the prevalence of cybercrime in Nigerian polytechnics.
  2. Identify the reasons why students engage in cybercrime.
  3. Determine the types of cybercrime often committed by polytechnic students in Nigeria.
  4. Ascertain the effect of students’ involvement in cybercrime has on their academic achievement.

CHAPTER TWO

REVIEWED OF RELATED LITERATURE

INTRODUCTION

According to Vladimir (2005) internet is a global network which unites millions of computer located in different countries and open broad opportunities to obtain and exchange information but it is now been used for criminal purposes due to the economic factors. Nigeria a third world country is faced with so many economic challenges such as poverty, corruption, unemployment amongst others, thereby, making this crime thrive. However, it will be inconclusive to base it only on economic challenge as the cause of cybercrime in Nigeria. Internet is the most technologically advanced medium of interaction. It is the information revolution that has turned the world into a global village. As a result of this value, it is assumed that internet usage in Nigeria is growing due to increasing availability of broadband connections and by observation, a decrease in subscription fee. This observed increase of internet users in Nigeria has made the internet a popular medium of communication and interaction as well as forum for online enterprises, such as, internet service provision (ISP), cyber cafes and cybercrime which was described by Ayantokun (2006) as all unlawful activities involving computer and internet.The internet services have reduced the world into a global village which makes it look as if everybody is in the same place at a particular point in time, aside from the fact that the internet has made communication to be easier and faster. A lot of other transactions are consummated at the speed of lightening. Oyewole and Obeta (2002), state that the internet is the inter connection of computer across the world thereby creating unlimited opportunities for mankind. According to Ehimen and Bola (2009), the internet has created a geometric growth and accelerated windows of opportunities for businesses and the removal of economic barriers hitherto faced by nations of the world. Considering these limitless advantages of the internet, one can easily subscribe to the fact that it is an important tool for national development in a developing country like Nigeria. McConnel (2000), argued that cybercrimes differ from most terrestrial crimes in four ways which are: They are easy to learn; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present and they are often not clearly illegal. As such, cybercrime has become one of the major security issues for law enforcement agencies and the world in general. According to a publication by Economic and Other Financial Crime Commission in Nigeria named Zero Tolerance (2006), stated that a retired civil servant with two (2) other accomplices defrauded a German citizen named Klaus Wagner a sum of USD 1, 714,080 through the internet. A 2007 internet crime report listed Nigeria third in terms of online crime activity and the prevalence of cybercrime among a sizeable number of young Nigerians (Sesan, 2010). Ribadu (2007), stated that the prominent forms of cybercrime in Nigeria are cloning of websites, false representations, internet purchase and other e – commerce kinds of fraud. Olugbodi (2010), opined that the most prevalent forms of cybercrime are website cloning, financial fraud, identity theft, credit card theft, cyber theft, cyber harassment, fraudulent electronic mails, cyber laundering and virus / worms / Trojans.

 

CHAPTER THREE

RESEARCH METHODOLOGY

INTRODUCTION

In this chapter, we described the research procedure for this study. A research methodology is a research process adopted or employed to systematically and scientifically present the results of a study to the research audience viz. a vis, the study beneficiaries.

 RESEARCH DESIGN

Research designs are perceived to be an overall strategy adopted by the researcher whereby different components of the study are integrated in a logical manner to effectively address a research problem. In this study, the researcher employed the survey research design. This is due to the nature of the study whereby the opinion and views of people are sampled. According to Singleton & Straits, (2009), Survey research can use quantitative research strategies (e.g., using questionnaires with numerically rated items), qualitative research strategies (e.g., using open-ended questions), or both strategies (i.e., mixed methods). As it is often used to describe and explore human behaviour, surveys are therefore frequently used in social and psychological research.

 POPULATION OF THE STUDY

According to Udoyen (2019), a study population is a group of elements or individuals as the case may be, who share similar characteristics. These similar features can include location, gender, age, sex or specific interest. The emphasis on study population is that it constitutes of individuals or elements that are homogeneous in description.

This study was carried to examine an Examination of the Prevalence of Cyber Crime and Its Influence of on Polytechnic Students in Nigeria. Federal Polytechnic, Nekede, Imo State form the population of the study.

CHAPTER FOUR

DATA PRESENTATION AND ANALYSIS

INTRODUCTION

This chapter presents the analysis of data derived through the questionnaire and key informant interview administered on the respondents in the study area. The analysis and interpretation were derived from the findings of the study. The data analysis depicts the simple frequency and percentage of the respondents as well as interpretation of the information gathered. A total of eighty (80) questionnaires were administered to respondents of which only seventy-seven (77) were returned and validated. This was due to irregular, incomplete and inappropriate responses to some questionnaire. For this study a total of 77 was validated for the analysis.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

Introduction      

It is important to ascertain that an Examination of the Prevalence of Cyber Crime and Its Influence of on Polytechnic Students in Nigeria. In the preceding chapter, the relevant data collected for this study were presented, critically analyzed and appropriate interpretation given. In this chapter, certain recommendations made which in the opinion of the researcher will be of benefits in addressing an examination of the Prevalence of Cyber Crime and Its Influence of on Polytechnic Students in Nigeria

Summary         

This study was on an examination of the Prevalence of Cyber Crime and Its Influence of on Polytechnic Students in Nigeria. Three objectives were raised which included:  Examine the prevalence of cybercime in Nigerian polytechnics, identify the reasons why students engage in cybercrime, determine the types of cybercrime often committed by polytechnic students in Nigeria and  ascertain the effect of students’ involvement in cybercrime has on their academic achievement. A total of 77 responses were received and validated from the enrolled participants where all respondents were drawn from sFederal Polytechnic, Nekede, Imo State. Hypothesis was tested using Chi-Square statistical tool (SPSS).

 Conclusion  

Taking cognisance of the nature and effects of cybercrime among undergraduates in Ebonyi State University, there will always be new and unexpected challenges to stay ahead of cyber criminals and cyber terrorists, but we can only do this successfully by partnership and collaboration of both individuals and government. There is much we can do to ensure a safe, secure and trust worth computing environment. It is crucial not only to our general sense of wellbeing but also, to our national security and economy. The remarkable development in human history through computer technology has no doubt brought transformation in all aspects of life, especially in communication and information technology. Nevertheless, the embracement of the internet has come with a lot of mixed feelings despite its numerous advantages to the undergraduate in Ebonyi State University, and people are valued regarding what they possess and command economically. Conversely, those without economic success are undervalued, and the pressure to achieve success is intensified despite the harsh financial condition such as unemployment amongst others. This necessitated the ability of individuals to devise survival strategies and attain economic success by indulging in cybercrime. The perpetrators of cybercrime are not far-fetched; they are our brothers, friends, colleague, distant relatives and neighbours who can be tamed under appropriate circumstances with the right and positive communication, orientation, education, and empowerment.

Recommendation

. Individuals should observe simple rules, individuals on their part should ensure proper anti-malware protection on their computer system, and individual should be encouraged to avoid pirate software, never to share their Identification Number (PIN), bank account, email access code to unknown persons.

University undergraduates should be educated on the proper use of cyber and internet.

University undergraduates should see cybercrime as a severe offence that destroys individual and the society at large and not as fun.

University undergraduates should stop making use of technology to the committee or facilitate the commission of traditional crimes.

Referernces

  • Nwannema .C. and C. Unadia, o. “Indigenous Information Technology Capacity Development,” Lagos (ICADEV) Publication, 2004.
  • Nsude, “cybercrime, A hidden danger of information communication technology (ICTS) in the21st century: The case of Nigeria,” The Nigeria Journal of Communication (1&2) 2005 Enugu Precision publisher limited
  • Federal Republic of Nigeria (FRN), “National strategy on education,” 5th edition, Lagos: NERDC press, 2013
  • Ofoegbu, O. “Internet as a source of Knowledge Generation for Students in Higher Institutions in Nigeria,” Survey of Education: Institute of Education Journal of University of Nigeria, Nsukka Vol. 18, No. 1, Pp. 120-125, 2007. [5]
  • Duggal in Anyanwu, “cybercrime,” retrieved from NARVI.org 11/8/2011 [6]
  • Anyanwu, I. “cybercrime,” retrieved from NARVI.org 2/8/2011 [7]
  • Atili, “Wanted; law for tackling cybercrime,” The nation, e-business August 26th P.41 (2011) [8]
  • Dennis, A. “cybercrime encyclopedia Britannica,” student and home edition. Chicago encyclopedia Britannica 2009 [9]
  • Oda, M. “Nigeria: Cybercrime time to stop countries dominance,” Daily Trust 2008 [10]
  • Obiyo, O, “Effects of Self Application Strategy on Socio-psychological behaviour on emotionally behaviourally disordered (EBD) pupils,” unpublished PhD thesis of University of Nigeria, Nsukka 2006 [11]
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!